Three things federal agencies should look for in access control

Digital lock icon

Protecting those who protect us requires a robust security solution that satisfies three important factors for federal agencies: compliance, certifications, and cybersecurity.

These factors play a crucial role in ensuring that only authorized individuals have access to government systems and data. By understanding and implementing these necessities, agencies can effectively safeguard their information and prevent unauthorized access.

Gallagher’s reliable, efficient, and effective security solutions have a proven history of meeting – and exceeding – the three factors of compliances, certifications, and cybersecurity, satisfying the world’s most stringent government standards and earning us a reputation as a trusted provider for high security solutions around the globe.

Security Compliance: Meet federal regulations with confidence

One of the most important factors that federal agencies should consider when implementing access control measures is compliance with government regulations. These regulations outline the specific security compliance requirements and standards that agencies must adhere to in order to protect sensitive information.

Gallagher’s security solutions are engineered to meet the stringent standards that define how high security sites around the world should be protected. Designed for security compliance with government standards around the globe, Gallagher’s end-to-end security architecture enforces business policies, identity, and credential management for secure environments. Although standards vary by region, legislation, and the degree of protection required, they are all met by our unwavering dedication to providing security that is intrinsic: always present, always working.

We lead the way in delivering high security compliant solutions for governments in the Five Eyes alliance which is testament to our strength in security. Organizations can be assured that our solutions are capable of protecting against both cyber and physical attacks.

The Gallagher Personal Identity Verification (PIV) solution is a purpose-built, end-to-end solution suitable to any environment that requires FICAM compliance and high assurance authentication to computer network resources. Approved and compliant with the latest Federal Information Processing Standards (FIPS) 201-3 including 13.01 and 13.02 topologies, the products and software that make up the Gallagher PIV solution encompass encryption technology, tamper defense, and redundancies for maximum cybersecurity across US federal government sites.

Gallagher's FICAM compliant options empower you to effortlessly meet the most stringent federal standards for access and identity, ensuring utmost compliance without disruption.

Certifications: Leading the way in federal and high security solutions

Another important factor for federal agencies to consider when implementing access control systems is the procurement of certifications and standards. Certifications, such as the Federal Information Processing Standards (FIPS), provide assurance that a product or system meets specific security requirements.

Gallagher Security has a proven history and reputation in the delivery of high security solutions around the globe, meeting some of the world’s most rigorous physical access control and cybersecurity government standards. We are widely recognized as one of the most trusted providers for high security solutions and have developed innovative perimeter, access control, and intruder alarm solutions, which are used to protect some of the world's most significant assets and locations.

We are proud of the many regulations, standards, accreditations, and awards we’ve earned by being an industry-leading, cybersecurity responsible vendor. Gallagher’s end-to-end security architecture enforces business policies, identity, and credential management for secure environments.

Some of the many certifications, we are proud to uphold are:

  • Global ISO9001 (International Organization for Standard)
  • ISO27001 (International Organization for Standard)
  • DCID 6/9 ICD 705 (Director of Central Intelligence Directive) (Intelligence Community Directive)
  • FIPS 201-3 Approvals; 13.01 and 13.02 Topology (Federal Information Processing Standard)
  • NIST FIPS199, SP800-53 (National Institute of Standards and Technology) (Federal Information Processing Standard)
  • FIPS 140-2 Level 3 Validated (Federal Information Processing Standard)
  • FISMA / NIST RMF (Federal Information Security Management Act) (National Institute of Standards and Technology) (Risk Management Framework)
  • UL 294, UL 1076, and UL 2050 Capable (Underwriters Laboratories Standards)
  • Section 889 Compliant
  • NDAA, BAA, TAA Compliant (National Defense Authorization Act) (Buy American Act) (Trade Agreements Act)
  • FICAM compliant
  • IEC 60335-2-76 Edition 2.2 2013-05 
  • AS/NZS 60335.2.76:2003 Edition 2.1 Incorporating A1, A2 & A3 
  • BS EN 60335-2-76:2005 + A2:2015 
  • SANS 60335-2-76:2006 Edition 2.1 
  • RoHS 
  • CE (EN50130-4 & CISPR 14-1) 
  • FCC 
  • EN50131 certification 
  • SOC2 certification 
  • CAPSS certification

Cybersecurity: Protecting against evolving threats

Cybersecurity is a critical concern for federal agencies when implementing access control systems. With the increasing threat of cyber attacks and data breaches, it is essential to prioritize the security of sensitive information.

Federal agencies should look for access control solutions that offer robust cybersecurity features, such as encryption, multi-factor authentication, and intrusion detection systems. These measures can help prevent unauthorized access and protect against potential cyber threats. Additionally, regular security audits and updates should be conducted to ensure the ongoing effectiveness of the access control system.

Gallagher has a goal of being the most cyber-secure physical security manufacturer. Powerfully designed, our solutions are created from inception to be as cyber secure as possible. We continuously evolve our solutions to meet the changing threats to both software and hardware, building in robust cybersecurity at every stage. Our commitment, as a cybersecurity-responsible supplier, means we are constantly practicing proactive measures to identify where new cyber attacks occur and potential vulnerabilities exist, including:

  • Software updates every 6 months
  • Controlling the supply from components to shipping
  • Numbering authority for MITRE’s CVE (Common Vulnerabilities & Exposures)
  • Internal and external penetration testing and documentation
  • Homeland Department of Security secured export partner

With a dedicated cybersecurity research team, we regularly carry out internal and external vulnerability testing that provides ongoing protection in a forever evolving cyber threat landscape. This ensures our customers are confident that their data is secure and protected from breaches and the ever-increasing threat of cyber attacks.

Our dedicated security and penetration testing team employs automated testing that runs thousands of scripts to ensure systems are as robust as possible. With 150 virtual machines running 20,000 tests nightly on Gallagher Command Centre, you can trust that we are continuously improving and validating that your site is secure, inside and out.

Gallagher is also authorized as a CVE Numbering Authority (CNA). In becoming a CNA, Gallagher demonstrates a level of maturity in cybersecurity and a commitment to communicating vulnerability information to customers.

Gallagher is extensively involved in securing critically important sites around the world. We bring that experience with us when our security specialists work with consultants and advisors to deliver solutions that are both right for the site and require an uncompromising degree of security.

Regardless of location, whether it is an embassy, military base, national utility facility, data center, or research lab, we know what it takes to protect sensitive sites. For operations in the US and beyond, there has never been a more important time to keep systems current and secure.

Don’t risk system vulnerabilities. Invest in a secure future.

Chat with our team of federal experts today. 

Meet our team of experts

We have assembled a team of security specialists who are passionate about sharing their knowledge and expertise.

SEE OUR AUTHORS


Do you have a question?

Let us put you in contact with one of our team members.

CONTACT US


Want to hear more from Gallagher?

Get the latest Gallagher news, updates, and event information delivered straight to your inbox.

SUBSCRIBE

Stay up to date with Gallagher

Get the latest Gallagher news, updates, and event information delivered straight to your inbox.

Apple Wallet Hero PR

Access. With just an iPhone or Apple Watch

Gallagher brings employee badge in Apple Wallet to customers via Gallagher Command Centre

X
Cookies help us improve your website experience.
By using our website, you agree to our use of cookies.
Confirm